GOVERNMENT > National


« Back to News

2024-05-08

Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

A Silent Invisible War: Israel has been developing its defences against cyber attacks, to function like the Iron Dome against missile attacks.

2024-05-19

Ukraine Has An AI-Generated Government Spokesperson

Digital Diplomat: Ukraine has an AI-generated spokesperson called Victoria Shi who will make official statements on behalf of its Foreign Ministry.

2024-05-07

The US Has A New Global Cyber Security Strategy

After years of escalating threats from China, Russia and cyber criminals, the US wants to build up international cyber security cooperation.

2024-05-03

Germany Threatens Russia With 'Consequences' For 2023 Cyber Attack

The German government now has clear evidence that Russian state-sponsored hackers Fancy Bear made an “intolerable” attack in 2023.

2024-04-24

US Legislators Want TikTok's Chinese Owners To Divest 

Election Year: TikTok could be banned in the US over urgent concerns about user data & electoral influence if the Chinese owners don't sell their stake.

2024-04-24

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

2024-03-29

British Parliament Debates Chinese Cyber Attacks 

Prime Minister Rishi Sunak has said China presents an “epoch-defining challenge” arising from cyber attacks on MPs and the Electoral Commission.

2024-03-25

France Suffers Massive Data Breach

Mega Data Breach: Over 50% of the French population’s personal data has been stolen in a cyber attack, with as many as 43 million citizens affected.

2024-03-14

French Government Suffers Severe Cyber Attacks

Several French government departments fall victim to a series of cyber attacks of “unprecedented intensity”.

2024-04-10

British Navy Combines With The Japanese Military To Counter Cyber Attacks

British Royal Navy specialists join forces with Japan's defence forces to deal with cyber attacks during a large-scale cyberwar exercise.

2024-03-22

Canada’s New Online Safety Law

Canada aims to combat child abuse, requiring quick removal of harmful content with very heavy penalties for inciting online hate and genocide.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

Vizius Group

Vizius Group

The Vizius Group are a think tank of cybersecurity consultants who understand the mechanics and business value of risk reduction.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.